Project Proposal for the

Smart Surveillance Technology

by

Javier Ocasio Pérez, Project Manager, sec. 031

William Sanchez Rosa, sec. 031

Abraham Díaz Santiago, sec. 031

Mariel Martínez Marrero, sec. 030

Dr. Fernando Vega and Dr. Nayda G. Santiago

ICOM 5047 sections 030 and 031

September 10, 2008

/ Project Proposal
Smart SurveillanceTechnology / J. Ocasio Perez, M. Martinez Marrero, A. Diaz Santiago,
W. Sanchez Rosa

Abstract

Surveillance of equipment prone to theft and damage in places like laboratories, universities and hospitals, is an important topic nowadays, as current technologies are not enough to solve the problem. The use of security guards, CCTV (close circuit television) and other technologies like cameras and software alone has not stopped the crime and damage rates [1]. For example, in the past 3 years, the University of Puerto Rico at Mayagüez reported 394 crimes of theftand damage toproperty, which has summed up to a loss of $125,000 [2]. The majority of the reported stolen equipment were computers, office tools and special laboratory equipment. Surveillance is not only beneficial for areas where equipment can be tampered with, and where its quality can be compromised, it can also be used for monitoring processes that can go on unattended.

We are proposing to develop a prototype for surveillance of highly sensitive equipment prone to theft and damage. The idea, called Smart Surveillance Technology (SST), will allow the customer to monitor an area via a web page interface;permitting the user to be connected from any device that uses Internet. The technology will alert the person whenever someone has entered the monitored area at a schedule not assigned to the system. SST will be able to alert with alarms, sending e-mails and text messages via SMS. The system will give the opportunity to the customer to make a quick decision about the situation.

Table of Contents

Abstract ...... 2

Figures Index ...... 5

Tables Index ...... 6

  1. Executive Summary ...... 7
  2. Project Name ...... 7
  3. Team ...... 7
  4. Introduction ...... 7
  5. Document Description...... 8
  6. Deliverables ...... 9
  7. Milestones...... 9
  8. Key Economic Aspects ...... 10
  9. Project Antecedents...... 10
  10. Market Description ...... 10
  11. Project Importance...... 11
  12. Proposed Solution ...... 12
  13. Objectives ...... 12
  14. Problem Statement ...... 12
  15. Possible Solutions...... 13
  16. Solution...... 13
  17. System Limitations ...... 14
  18. Design Specifications ...... 15
  19. Hardware...... 16
  20. Flow chart ...... 17
  21. Solution ...... 18
  22. Temperature Sensor ...... 18
  23. Fire Sensor ...... 18
  24. Camera ...... 19
  25. Microprocessor ...... 20
  26. Alarm ...... 21
  27. Software ...... 21
  28. Flow Chart ...... 22
  29. Solution...... 23
  30. Main Application Service...... 23
  31. Web Application Interface...... 23
  32. Data Base ...... 23
  33. Schedule ...... 24
  34. Giant Chart...... 24
  35. Work Breakdown Structure ...... 24
  36. Measurability ...... 30
  37. Risk Assessment ...... 31
  38. Risk Management Plan ...... 31
  39. Risk A: Team members Health ...... 31
  40. Risk B: Team member leaves group ...... 31
  41. Risk C: Hardware or Software failure ...... 31
  42. Risk D: Conflicts between team members ...... 32
  43. Risk E: Parts do not arrive ...... 32
  44. Risk F: Parts failure ...... 32
  45. Risk G: Hurricane and weather conditions ...... 32
  46. Legal Constraints ...... 33
  47. Direct and Indirect Effects ...... 33
  48. Health and Safety ...... 33
  49. Environment ...... 33
  50. Ethical Considerations ...... 34
  51. Modular Behavior ...... 34
  52. Personnel Background ...... 34
  53. Biographies ...... 34
  54. Technical Knowledge ...... 36
  55. Budget ...... 37
  56. Personal Engineer Resources ...... 38
  57. Hardware ...... 38
  58. Software ...... 39
  59. Miscellaneous ...... 40
  60. Overall Cost ...... 40
  61. Single Unit Cost ...... 40
  62. Expected Sale Price ...... 41
  63. References ...... 43

Figures Index

Figure 1: High-Level Block Diagram ...... 15

Figure 2: Hardware Flow chart...... 17

Figure 3: Software Flow chart ...... 22

Figure 4: Refer to Figure 15, page 42 ...... 24

Figure 5: Refer to Figure 16, page 43 ...... 24

Figure 6: Top Tier Work Breakdown Structure ...... 26

Figure 7: Tier 1.1, 1.2, 1.3, and 1.4 Work Breakdown Structure ...... 26

Figure 8: Tier 2 Work Breakdown Structure ...... 26

Figure 9: Tier 2.1.1 Work Breakdown Structure ...... 27

Figure 10: Tier 2.1.2 Work Breakdown Structure ...... 27

Figure 11: Tier 2.1.3 Work Breakdown Structure ...... 28

Figure 12: Tier 2.1.4 Work Breakdown Structure ...... 28

Figure 13: Tier 2.2.1 Work Breakdown Structure ...... 28

Figure 14: Tier 3 Work Breakdown Structure ...... 29

Figure 15: Tier 4 Work Breakdown Structure ...... 29

Tables Index

Table 1: WBS Task summary ...... 25

Table 2: Total Employment Salary ...... 38

Table 3: Total Hardware Cost ...... 39

Table 4: Total Software Cost ...... 39

Table 5: Total Miscellaneous Cost ...... 40

Table 6: Total Project Cost ...... 40

Table 7: Total Project per unit cost ...... 41

Table 8: Sensorsoft Total Price ...... 41

  1. Executive Summary
  2. Project Name
    Smart Surveillance Technology (SST)
  3. Team
    Vision and Security Team (VST) consists of the following members:
  4. Javier Ocasio Pérez, Project Manager
  5. Mariel Martínez Marrero, Hardware Engineer
  6. Abraham Diaz Santiago, Software Engineer
  7. William Sanchez Rosa, Software Engineer
  8. Introduction

During the past 50 years, surveillance has been an integral part of our society. Surveillance has many purposes but mainly it is used for assuring no wrongdoing is being committed according to society’s conventions (laws and ethics). It is believed that since no one is looking, then one can do as one pleases, and this may very well be true in our houses and personal space, but not at work or in a private property. Surveillance has been used in cities like London, where the use of thousands of cameras that record 24 hours a day in their public places allegedly resulted in lower crime rates [3]. There exits debate and controversy about the effectiveness of lowering crime by the use of cameras [2], especially when there are many cameras and no personnel actually watching them. Surveillance is also used to protect property, (i.e.: jewelry stores, banks and hospitals). Sometimes we need more interaction, more information, and in other cases, we may actually need to see what is occurring in real-time.

The purpose of our proposal is the use of technology to add another series of devices to improve monitoring equipment prone to theft and damage. There are a lot of places where highly sensitive equipment is used and where, not just the equipment, but also processes go on unattended that may need monitoring. There are also high security areas where equipment can be tampered with or where quality can be compromised.

Among the places that need monitoring of specialized equipment are laboratories, hospitals and museums. Laboratories deal with very costly equipment and have ongoing research where sensitive processes occur. These laboratories usually deal with multi-million dollar contracts and federal funding. Here we could monitor the temperature of an area, missing equipment and personnel entering the area for changes. In hospitals, there are areas with drugs, medical equipment and even highly dangerous materials like toxic gases and radiation tools that should be monitored. For museums, some articles are invaluable and also need monitoring. For example, old exhibits like mummies need special temperatures to prevent from rotting.

The proposed system is a Smart Surveillance Technology (SST) system for the monitoring of sensitive equipment, linking the administrator with the conditions in the room and even making it possible to remotely access the system. We want to keep the user informed of any unauthorized movement, changes in temperature and fire hazards. The interface would be one of two mediums, text messages and e-mail. We would warn the administrator via SMS (Text Messaging) and e-mail of the situation and provide a direct link for the user to log on to the system from a remote location. This will enable the customer to see the system status and to actually observe what is happening in the room. The system will save users time in case of a change in the normal environment and will provide the customers with the most valuable thing: information which will enable them to act rapidly.

1.4.Document Description

This document presents a proposal for the Smart Surveillance Technology System. There is a description of the functionality of the system, the deliverables and milestones, its hardware and software components, and its relevance.

A Gantt diagram has been created, in which all members of the team have equally distributed all the work, in two variables: time, and personnel. There is also a presentation of risk mitigation, monitoring, and management plan for every relevant risk of the project, so the team is able to prevent them, and in case of materialization, control the damage. Also, a background of the personnel that will work in the project is included, with their responsibilities on the project, their past experiences, and their professional level. The document also includes a realistic budget for the project, including the personnel salaries, and hardware cost.

1.5.Deliverables

  • Prototype of the hardware devices
  • This includes the device that has the microprocessor, sensors and camera. Also, the device will be connected directly to a computer server.
  • Web Application
  • User Interface
  • Database
  • Logs and live-streams
  • Sending of SMS and email alerts
  • Main Application Service (MAS)
  • This Includes:
  • Interface with microprocessor
  • Analysis and interpretation of signals
  • Manage motion detection and snapshot online storage
  • Live-streaming
  • Scheduling enforcement
  • Triggeringof Alarms
  • Progress and final reports
  • Contains the final costs, specifications of the project and the results obtained
  • User Manual
  • Explains the users the steps to follow for installing and configuring the product. Also,itwill contain a detailed description of the system as well as a series of troubleshooting indications.
  • Milestones

VST is going to divide the SST’s development in 5 phases. In each phase, our team is going to deliver a progress report and a presentation.

  • Phase 1: Defining the problem
  • Proposal (September 10, 2008)
  • Presentation (September 10, 2008)
  • Phase 2: Database and Microprocessor to computer communication
  • Progress Report #1 (October 29, 2008)
  • Presentation (October 15, 2008)
  • Phase 3: Sensor data collecting
  • Presentation (November 5, 2008)
  • Phase 4: Final Prototype and testing
  • Presentation (November 26, 2008)
  • Phase 5: Final Documentation
  • Final Report (December 1, 2008)
  • Final presentation (Date selected by Register’s office)
  • User Manual (Dec 1, 2008)
  • Device and Web interface running together (Dec 1, 2008)

1.7.Key Economical Aspects

The following is a brief explanation of economical aspects related to costs, single cost per unit and possible price of our system in comparison with today’s market. A more detailed budget analysis is covered on section8.

A possible initial cost of the system including personal, hardware, software implementation, and miscellaneous cost, taking into considerationthe overhead, can range from $20,000 to $30,000. After the product is finalized, an approximate cost per unit will be $350.00. Sensorsoft©, one of the companies that will be described in the market description area of this document, which is our primary competitor, has a solution which costs $1,232.99 (camera, software, temperature and humidity sensors). VST©, have decided as a team, to establish a competitive selling price of $700.00, in order to achieve a gross margin income of 50%. That way, all cost of the system will be covered and a profit gain of 100% will be achieved.

  1. Project Antecedents
  2. Market Description

There are three areas of interest on the market: camera technology, sensor technology, and software solutions. In the past, the industry standard has been CCTV (close circuit television) but there are new technologies changing the field, such as USB and IP cameras. They both connect to a computer, and in the case of IP cameras, they even offer power over Ethernet as their power supply. These cameras have the advantage of remotely viewing the image feed from anywhere around the world, opening the possibility of profiting more from the surveillance market. The use of IP cameras is very useful in long distance monitoring as utilized by Skynet Broadband Solutions [4]. Other competitors specialize in HD (High Definition) cameras for a smaller but more demanding market of webcasting users; this is usually used for weather reports and traffic news by television stations and government agencies [5]. There are also night vision cameras ranging from $39.67 [6] to $634.99 [7], with the ability to monitor dark areas.

Our system focuses on advanced monitoring of data collected from sensors. This is not a new idea, as there are many other systems in the market with similar capabilities. One of them is the SensorSoft Co. Remote Watchman, which allows the user to monitor several computer servers for temperature and humidity, as well as allowing the user to log on via the internet to see real time data (updated every 30secs.). This product is very useful for companies with many servers, but complete product solutions range from $199.00 to $498.00 [8] with a variety of choices. In the network administration area, there are other solutions that even monitor computer fans and power shortages, but their services are very specialized which include network traffic monitoring and other features that go beyond our needs [9].

An integral part of surveillance is the software that manages movement recognition and other features. In the market, the dominant solution is EyeLine Video Surveillance [10]. An interesting fact is that the EyeLine Video Surveillance Company promotes the free software in order to bring attention to their other business applications, like imaging and broadcasting software. Other applications include features like FTP backup of images and an HTTP server.

2.2.Project Importance

Our system will offer a smart surveillance system for areas that contain equipment susceptible to theft and damage. The system will combine camera, sensors and software technologies along with a web application. The system will be able to store an image stream, send text messages and e-mail notices when an alarm occurs. The web application will provide user management so that different users can access the information of the sensors and live streams remotely. With these technologies, the customer will be able to see the system status and observe what is happening in their monitored areas. The system will save users time in case an alarm is triggered,by providing information which will enable them to act rapidly whenever their monitored area or equipment is in danger.

  1. Proposed Solution
  2. Objetives

To create a solution that integrates hardware and software to resolve the problem of security and monitoring of sophisticated equipment.

  • Incorporate sensors for the monitoring of equipment
  • Access the system by a web application
  • Analyze movement by image comparison
  • Shortening the time between situation and response of the administrator.

3.2.Problem Statement

There is a need to provide monitoring to sensitive equipment susceptible to theft and damage. Sensitive equipment as defined by the University of Maryland can be considered as those items valued at less than $5000 which are most at risk of theft. An example of an institution that deals with sensitive equipments is universities. In most cases, university departments are responsible for security and control of all equipment items, with particular attention to those items vulnerable to misappropriation or misuse regardless of the unit cost. By the most part, monitoring of missing equipment is done in many organizations by the use of inventory procedures and guided by administrative directives. Sensitive equipment, for example, in libraries could include office equipment, e.g., calculators, and audio-visual equipment, e.g., radios, portable television sets, projectors and screens. Equipment valued at greater than $5000 per item and computer equipment can be considered as capital equipment, whether purchased outright, acquired through a capital lease or through donation [11]. The sensitive equipment may also have special needs, not limited to visual monitoring. An example is temperature monitoring of hospital equipment that needs to be under a specified temperature to operate correctly.

Nowadays, there exist many sophisticated security and surveillance systems. However, most of these systems are expensive and mainly used in military and homeland security environments [12]. These solutions do not seem to be a viable solution to all the owners of sensitive equipment, for example, universities with low budget, government agencies, community hospitals, new businesses that are just starting out, and even non-profit organizations. An example of one of these entities is the University of Puerto Rico at Mayaguez, which in the last 3 years reported 394 crimes of theft and damage to property, which resultedin a loss of $125,000 [2].Also, the technologies currently used for monitoring, like CCTV (close circuit television) and other technologies like cameras and software alone have not prove to be enough to solve surveillance problems [1]. Therefore, there is a need to provide a smart surveillance system forthe monitoring of sensitive equipment susceptible to theft and damage.

3.3.Possible Solutions

There are many solutions in surveillance technology, but the industry is dominated by software solutions requiring only a camera (USB or IP) and some software running in the background. An example of this is EyeLine Video Surveillance, from NCH Software [10] providing a surveillance application free of charge. Other solutions include their own camera, but many of these appear to be less reliable. An example of this type of solution is the X10 Home Camera Surveillance System[13]. For more robust and professional applications, a solution like the one from ProTechComputer [14] with a flexible array of cameras is preferable, but the price for this kind of solution goes up very high as they are customized for the client. Almost all of these technologies implement a passive surveillance where most of the work depends on a user watching, or requiresgoing back to recorded data in case a situation has occurred. Active surveillance of missing equipment recognition and sensor implementation is lacking in most of these solutions leaving space for new integrated and proactive solutions.

3.4.Solution

Our proposed solution as mentioned before is a Smart Surveillance Technology System for the monitoring of sensitive equipment; it is an integrated system of hardware and software components. It will be composed of sensors, cameras, servers, applications and a website. It will also implement other mediums of communication like SMS (Text Messaging) and e-mail.

The sensors would be comprised of a temperature sensor (to be used in places like laboratory hoods), a smoke sensor that can be placed near the roof to be able to function properly, and a camera placed near the equipment to catch the movement or activity in a room via analysis of images. All the sensors will provide data to a microprocessor that will be able to act according to its programming and react to different situations. The system will then connect to the server and it will send the appropriate alerts to cell phones and e-mails.